Efficient anonymous authentication scheme for automatic dependent surveillance?broadcast system with batch verification

نویسندگان

چکیده

Automatic Dependent Surveillance-Broadcast (ADS-B) system provides significant improvements in air traffic control such as optimal routing non-radar environments with a new level of safety and efficiency. The ADS-B is being installed many aircrafts recent year. equipped aircraft broadcasts the information to nearby ground stations either once or twice per second. Because open channel communication atmosphere, affected by security attacks. Many authentication batch verification schemes are available provide data integrity source for system. But they suffering from computational overhead overhead. Hence, an efficient anonymous scheme proposed based on Message Recovery Signature (MRS). performance analysis section ensure that essential features less comparison other existing schemes.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs

In this paper, we introduce an efficient Conditional Privacy-Preserving authentication scheme(ECPB) based on group signature for vehicular ad hoc networks (VANETs). Although group signature is widely used in VANETs for security requirements, the existing schemes based on group signatures suffer longer computational delays in the certificate revocation list (CRL) checking and in the signature ve...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

An efficient and secure anonymous mobility network authentication scheme

The demands of Internet users are steadily increasing. Many users access Internet services through mobile devices via wireless networks. To prevent disclosure of private data, researchers have proposed various anonymous roaming authentication schemes which apply different technologies to provide integral security properties, such as symmetric and asymmetric encryption, digital signature, timest...

متن کامل

Efficient Batch Verification for UP

Consider a setting in which a prover wants to convince a verifier of the correctness of k NP statements. For example, the prover wants to convince the verifier that k given integers N1, . . . , Nk are all RSA moduli (i.e., products of equal length primes). Clearly this problem can be solved by simply having the prover send the k NP witnesses, but this involves a lot of communication. Can intera...

متن کامل

A Large-scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing

Recently, with the rapid development of big data, Internet of Things (IoT) brings more and more intelligent and convenient services to people’s daily lives. Mobile healthcare crowd sensing (MHCS), as a typical application of IoT, is becoming an effective approach to provide various medical and healthcare services to individual or organizations. However, MHCS still have to face to different secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iet Communications

سال: 2021

ISSN: ['1751-8636', '1751-8628']

DOI: https://doi.org/10.1049/cmu2.12152